References
- E. Smirni, and G. Ciardo, "Workload-Aware Load Balancing for ClusterWeb Servers," IEEE Trans. on Parallel and Distributed Systems, Vol. 16, No. 3, pp. 219-232, March 2005. https://doi.org/10.1109/TPDS.2005.38
- M. S. Hwang, C. C. Lee, Y. L. Tang, "ASimple Remote User Authentication Scheme," Mathematical and Computer Modeling 36, pp.103-107, 2002. https://doi.org/10.1016/S0895-7177(02)00106-1
- E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "An improvements of Hwang-Lee-Tang's simple remote user authentication scheme," Computer and Security 24, pp.50-56, 2005. https://doi.org/10.1016/j.cose.2004.06.004
- H. M. Sun, "An Efficient Remote Use Authentication Scheme Using Smart Cards," IEEE Transaction on Consumer Electronics, Vol.46, No.4, pp.958-961, November 2000. https://doi.org/10.1109/30.920446
- H.Y.Chien, J.K.Jan, and Y.M.Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card," Computer and Security, Vol.2, No.4, pp.372-375, 2002.
- H.C.Hsiang and W.K.Shih, "Weakness and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications 32, pp.649-652, 2009. https://doi.org/10.1016/j.comcom.2008.11.019
- K. L. Das, A. Saxena, and V. P. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Transactions on Consumer Electronics, Vol.50, No.2, pp.629-631, 2004 https://doi.org/10.1109/TCE.2004.1309441
- H.Y.Chien, and C.H.Chen, "A remote authentication scheme preserving user anonymity," IEEE AINA'05, Vol.2, pp.245-248, March 2005.
- L. Hu, Y, Yang, and X. Niu, "Improved Remote User Authentication Scheme Preserving User Anonymity," Fifth Annual Conference on Communication Network and Services Research(CNSR), pp.323-328, 2007
- W. B. Horng, C. P. Lee, and J.W. Peng, "A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards," WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, Issue 5, Vol.7, pp.619-628, May 2010.
- E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Lecture Notes in Computer Science, Vol.3156, pp.135-152, 2004.
- S. Mangard, N. Pramstaller, and E. Oswald, "Successfully attacking masked AES hardware implementations," Lecture Notes in Computer Science, Vol.3659, pp.157-171, 2005.
- O. Choudary (osc22), "Breaking Smartcards Using Power Analysis", University of Cambridge.
- Y. R. Baek, K. E. Gil, J.C.Ha, "Aremote Protocol Using Smart Card to Guarantee User Anonymity", Journal of Korea Society for Internet Information, Vol.10, No.6, pp.229-239, 2009
- C. S. Bindu, P. C. S. Reddy, and B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity," IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.3, pp.62-66, March 2008.
- S. I. Kim, J. Y. Chun, andD.H. Lee, "AnonymityUser Authentication Scheme with Smart Cards preserving Traceability", Journal of Korea Institutes Information Security and Cryptology, Vol.18,No.5, pp.31-39, 2008. 10.